| With the increasingly severe environmental pollution and resource shortages,the Energy Internet,which supports the large-scale utilization of renewable energy,which caused extensive attention.Because the Energy Internet is a complex energy network formed by a high degree of coupling of multiple energy sources,it involves information networks,energy trading networks,electrified transportation networks,and other network entities closely related to people’s production and life.The total amount of information is huge and diverse.There is a potential risk of user privacy disclosure.This thesis elaborates on the basic concepts of the Energy Internet,the structural entities involved,and related service models from the perspective of protecting user data privacy.Through the analysis of the energy Internet structure and service model,the traditional data aggregation privacy protection scheme is improved and optimized as a whole.In view of the different security requirements of the Energy Internet,three user data privacy protection schemes are proposed to form a complete Energy Internet user privacy protection solution.(1)A real-time power data privacy protection scheme that supports device authentication.In the process of user data collection in the Energy Internet,there are problems such as user privacy leakage,complex device identity authentication,and data aggregation failure due to device failure.Aiming at the above problems,the user data privacy protection is implemented based on the homomorphic encryption algorithm;the data source authentication is performed by means of group verification;and the flexible aggregation threshold mechanism is designed to realize equipment fault tolerance in the data aggregation process.(2)A regional data aggregation scheme that supports device identity anonymity protection.In the process of Energy Internet data communication,there are problems such as information leakage of data collection equipment and large data aggregation overhead.In response to the above problems,the pseudonym certificate is used to realize the anonymity of the device;the cloud-mixed system architecture is used to transfer data aggregation and other calculations to the edge of the network for processing,thereby improving system efficiency.(3)A real-time power data privacy protection scheme to support the traceability of malicious users.In the process of real-time power consumption,there is a problem that user data privacy protection and malicious user behavior are difficult to trace back.Aiming at this problem,the data privacy protection is implemented based on the BGN algorithm.The identity-based encryption algorithm is used to record the identity information with the transmission message to realize the traceability of malicious user behavior.For the above schemes,detailed security analysis and performance analysis are provided to prove that the proposed solution can meet the user data privacy protection requirements in the Energy Internet. |